-
Notifications
You must be signed in to change notification settings - Fork 111
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Linting OCSP responses #458
Comments
This came up once in the past #382. I think the consensus is: Yes! We'd love to have them, but we should structure their addition such that they don't make running or maintaining existing certificate lints more difficult. |
I think this fits into our sets of lints nicely, we could even exclude OCSP/CRL lints by default. |
+1 for being able to linting CRLs too |
We've been reviewing the entire corpus of Mozilla Bugzilla CA incidents and this has come up for another CA. |
Hi Maintainers,
Please let me know. We're planning to implement something internally which we can think of contribute to zlint. |
In this bug, Apple shared a very thorough list of lints they apply to OCSP responses from their own issuance infrastructure. It would be useful to implement these in an open-source linter. Are the folks here interested in incorporating an OCSP linter into zlint? Do you think it would be better as a separate project?
The text was updated successfully, but these errors were encountered: